{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:GOQC2LIDWPE3WEHUSBMMQZG7PR","short_pith_number":"pith:GOQC2LID","canonical_record":{"source":{"id":"1907.10442","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-07-23T17:50:43Z","cross_cats_sorted":["cs.LG","cs.NI"],"title_canon_sha256":"c2348184d98e9a494210b33aeccddc774ea9dc50cd9fabd4a772b0efa40682d1","abstract_canon_sha256":"8a0acf4cb2656e4de56c331f3c3f7b34a920788108ac64b44134d8c801a5d54f"},"schema_version":"1.0"},"canonical_sha256":"33a02d2d03b3c9bb10f49058c864df7c6f232660633f152107277df4cae14a46","source":{"kind":"arxiv","id":"1907.10442","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1907.10442","created_at":"2026-05-17T23:39:37Z"},{"alias_kind":"arxiv_version","alias_value":"1907.10442v1","created_at":"2026-05-17T23:39:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.10442","created_at":"2026-05-17T23:39:37Z"},{"alias_kind":"pith_short_12","alias_value":"GOQC2LIDWPE3","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_16","alias_value":"GOQC2LIDWPE3WEHU","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_8","alias_value":"GOQC2LID","created_at":"2026-05-18T12:33:18Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:GOQC2LIDWPE3WEHUSBMMQZG7PR","target":"record","payload":{"canonical_record":{"source":{"id":"1907.10442","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-07-23T17:50:43Z","cross_cats_sorted":["cs.LG","cs.NI"],"title_canon_sha256":"c2348184d98e9a494210b33aeccddc774ea9dc50cd9fabd4a772b0efa40682d1","abstract_canon_sha256":"8a0acf4cb2656e4de56c331f3c3f7b34a920788108ac64b44134d8c801a5d54f"},"schema_version":"1.0"},"canonical_sha256":"33a02d2d03b3c9bb10f49058c864df7c6f232660633f152107277df4cae14a46","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:37.914044Z","signature_b64":"8rQs26XUdx6Sk5FJ9MI7nLRY48/baAWR/XK+2uY+4Rs88Fyak6OozlDgOy6YidsV3p3Fq+2Oh2GGHbApPbQyCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"33a02d2d03b3c9bb10f49058c864df7c6f232660633f152107277df4cae14a46","last_reissued_at":"2026-05-17T23:39:37.913544Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:37.913544Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1907.10442","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OkKyl2S53qaGkM/Ih5bic92xg6HBZtbOdGVJP7zpKFkkWgY7v2s+jJ46ZgzG8o0hDM9U4U3pTN73trbQYuBjCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T08:09:37.270863Z"},"content_sha256":"47162ba92293ed727bc95c441f59fcae623605fcd26dbe14ab224e750a38ae4b","schema_version":"1.0","event_id":"sha256:47162ba92293ed727bc95c441f59fcae623605fcd26dbe14ab224e750a38ae4b"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:GOQC2LIDWPE3WEHUSBMMQZG7PR","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","cs.NI"],"primary_cat":"cs.CR","authors_text":"Ankit Gupta, Ayush Hariharan, Trisha Pal","submitted_at":"2019-07-23T17:50:43Z","abstract_excerpt":"As machine learning and cybersecurity continue to explode in the context of the digital ecosystem, the complexity of cybersecurity data combined with complicated and evasive machine learning algorithms leads to vast difficulties in designing an end to end system for intelligent, automatic anomaly classification. On the other hand, traditional systems use elementary statistics techniques and are often inaccurate, leading to weak centralized data analysis platforms. In this paper, we propose a novel system that addresses these two problems, titled CAMLPAD, for Cybersecurity Autonomous Machine Le"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.10442","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"AS1adiXPltbaJWAleGpF1hFqYcA19T5X7FAHkootgs3DTTtGoXcSG7Fmc126HgZP1RjcVPdQfG1sptW/WtBkAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T08:09:37.271584Z"},"content_sha256":"389f9983a0b5ac2948f0fdb26c060717eb33888cf7178718668cee991e10eece","schema_version":"1.0","event_id":"sha256:389f9983a0b5ac2948f0fdb26c060717eb33888cf7178718668cee991e10eece"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR/bundle.json","state_url":"https://pith.science/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T08:09:37Z","links":{"resolver":"https://pith.science/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR","bundle":"https://pith.science/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR/bundle.json","state":"https://pith.science/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GOQC2LIDWPE3WEHUSBMMQZG7PR/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:GOQC2LIDWPE3WEHUSBMMQZG7PR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8a0acf4cb2656e4de56c331f3c3f7b34a920788108ac64b44134d8c801a5d54f","cross_cats_sorted":["cs.LG","cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-07-23T17:50:43Z","title_canon_sha256":"c2348184d98e9a494210b33aeccddc774ea9dc50cd9fabd4a772b0efa40682d1"},"schema_version":"1.0","source":{"id":"1907.10442","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1907.10442","created_at":"2026-05-17T23:39:37Z"},{"alias_kind":"arxiv_version","alias_value":"1907.10442v1","created_at":"2026-05-17T23:39:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.10442","created_at":"2026-05-17T23:39:37Z"},{"alias_kind":"pith_short_12","alias_value":"GOQC2LIDWPE3","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_16","alias_value":"GOQC2LIDWPE3WEHU","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_8","alias_value":"GOQC2LID","created_at":"2026-05-18T12:33:18Z"}],"graph_snapshots":[{"event_id":"sha256:389f9983a0b5ac2948f0fdb26c060717eb33888cf7178718668cee991e10eece","target":"graph","created_at":"2026-05-17T23:39:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"As machine learning and cybersecurity continue to explode in the context of the digital ecosystem, the complexity of cybersecurity data combined with complicated and evasive machine learning algorithms leads to vast difficulties in designing an end to end system for intelligent, automatic anomaly classification. On the other hand, traditional systems use elementary statistics techniques and are often inaccurate, leading to weak centralized data analysis platforms. In this paper, we propose a novel system that addresses these two problems, titled CAMLPAD, for Cybersecurity Autonomous Machine Le","authors_text":"Ankit Gupta, Ayush Hariharan, Trisha Pal","cross_cats":["cs.LG","cs.NI"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-07-23T17:50:43Z","title":"CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.10442","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:47162ba92293ed727bc95c441f59fcae623605fcd26dbe14ab224e750a38ae4b","target":"record","created_at":"2026-05-17T23:39:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8a0acf4cb2656e4de56c331f3c3f7b34a920788108ac64b44134d8c801a5d54f","cross_cats_sorted":["cs.LG","cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-07-23T17:50:43Z","title_canon_sha256":"c2348184d98e9a494210b33aeccddc774ea9dc50cd9fabd4a772b0efa40682d1"},"schema_version":"1.0","source":{"id":"1907.10442","kind":"arxiv","version":1}},"canonical_sha256":"33a02d2d03b3c9bb10f49058c864df7c6f232660633f152107277df4cae14a46","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"33a02d2d03b3c9bb10f49058c864df7c6f232660633f152107277df4cae14a46","first_computed_at":"2026-05-17T23:39:37.913544Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:39:37.913544Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"8rQs26XUdx6Sk5FJ9MI7nLRY48/baAWR/XK+2uY+4Rs88Fyak6OozlDgOy6YidsV3p3Fq+2Oh2GGHbApPbQyCg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:39:37.914044Z","signed_message":"canonical_sha256_bytes"},"source_id":"1907.10442","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:47162ba92293ed727bc95c441f59fcae623605fcd26dbe14ab224e750a38ae4b","sha256:389f9983a0b5ac2948f0fdb26c060717eb33888cf7178718668cee991e10eece"],"state_sha256":"d83076db8e0a54fb4f4c2e4bc61446ccd4dab105b503a05c57c2301f7f36ae57"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OrvxeL4ruD5UNoL5T/yLB7V9m3mJCaXgqvuV38+5EIdoJLwiC/LlGCSSUW88Qm15H2ZexaObjY3hFlwDa8moBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T08:09:37.275561Z","bundle_sha256":"f162723dc0a7dfd4c5010f573134d2595a9ea39bca5a19c7b08a763661120b5b"}}